2020
DOI: 10.1142/s0219622020500200
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Key Generation for Data Sanitization and Restoration of Cloud Data: Future of Financial Cyber Security

Abstract: Cloud security in finance is considered as the key importance, taking account of the aspect of critical data stored over cloud spaces within organizations all around the globe. They are chiefly relying on cloud computing to accelerate their business profitability and scale up their business processes with enhanced productivity coming through flexible work environments offered in cloud-run working systems. Hence, there is a prerequisite to contemplate cloud security in the entire financial service sector. Moreo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(4 citation statements)
references
References 35 publications
0
2
0
Order By: Relevance
“…Therefore, this research determined certain important problems stated above in the previous study 12 , 14 , 17 , 18 , 24 , which it resolved and turned into the main subject of this research contributions to the field. These crucial concerns comprise, but are not restricted to, the following: Which value will determine how long the key is?…”
Section: Introductionmentioning
confidence: 83%
See 1 more Smart Citation
“…Therefore, this research determined certain important problems stated above in the previous study 12 , 14 , 17 , 18 , 24 , which it resolved and turned into the main subject of this research contributions to the field. These crucial concerns comprise, but are not restricted to, the following: Which value will determine how long the key is?…”
Section: Introductionmentioning
confidence: 83%
“…Some studies are emphasizing data sanitization process using optimized key, whereas only a few studies have proposed a privacy-preserving restoration procedure for autism data with limited performance accuracies 12 23 . Data restoration refers to the retrieval of backup data from secondary storage and its reinstatement to its initial or an alternative location 24 . The procedure is crucial in guaranteeing the effective recovery of genuine data and promoting computer network development.…”
Section: Introductionmentioning
confidence: 99%
“…For example, in work [22], Alphonsa MMA et al developed a secure model named GMGW to sanitize sensitive information of heart disease data based on the cloud system. In the same way, the authors in [24,25,28] developed security and privacy models individually by applying different algorithms to the cloud computing system for data security and compared the performance of their models with the conventional algorithms for more improvement.…”
Section: Security and Privacy In Processing Medical Datamentioning
confidence: 99%
“…In addition, some of these traditional meta-heuristics algorithms also possess lower solving precision, slower convergence, and worse local searching ability. Moreover, we identified certain critical issues in the existing studies [5,6,[24][25][26] which we addressed, thus forming the focus of our research contributions. Such critical issues, put in question form, include, but are not limited to, the following:…”
Section: Introductionmentioning
confidence: 99%